Abstract: The main objective of our study is to collect data
about the profile of the asthmatic patients in Assam and thereby have
a comprehensive knowledge of the factors influencing the asthmatic
patients of the state and their medication pattern. We developed a
search strategy to find any publication about the community based
survey asthma related and used. These to search the MEDLINE
(1996 to current literature) CINAHL DOAJ pubmed databases using
the key phrases, Asthma, Respiratory disorders, Drug therapy of
Asthma, database decision support system and asthma. The
appropriate literature was printed out from the online source and
library (Journal) source. The study was conducted through a set of
structured and non-structured questionnaires targeted on the
asthmatic patients belonging to the rural and urban areas of Assam,
during the month of Dec 2006 to July 2007, 138 cases were studied
in Gauwathi Medical College & Hospital located in Bhangagarh,
Assam in India. The demographic characteristics a factor in 138
patients with asthma with allergic rhinitis (cases) gives the detail
profile of asthmatic patient-s distribution of Assam as classified on
the basis of age and sex. It is evident from the study that male
populations (66%) are more prone to asthma as compared to the
females (34%).Another striking features that emerged from this
survey is the maximum prevalence of asthma in the age group of 20-
30 years followed by infants belonging to the age group of 7 (0.05%)
0-10years among both male and female populations of Assam. The
high incidence of asthma in the age group of 20-30 years may
probably be due to the allergy arising out of sudden exposure to dust
and pollen which the children face while playing and going to the
school. The rural females in the age group of 30-40 years are more
prone to asthma than urban females in the same age group may be
due to sex differentiation among the tribal population of the state.
Pharmacists should educate the asthmatics how to use inhalers
considering growing menace of asthma in the state. Safer drugs
should be produced in the form of aerosol so that easy administration
by the asthmatic patients and physicians of the state is possible for
curing asthma. The health centers should be more equipped with the
medicines to cure asthma in the state like Assam.
Abstract: On a such wide-area environment as a Grid, data
placement is an important aspect of distributed database systems. In
this paper, we address the problem of initial placement of database
no-replicated fragments in Grid architecture. We propose a graph
based approach that considers resource restrictions. The goal is to
optimize the use of computing, storage and communication
resources. The proposed approach is developed in two phases: in the
first phase, we perform fragment grouping using knowledge about
fragments dependency and, in the second phase, we determine an
efficient placement of the fragment groups on the Grid. We also
show, via experimental analysis that our approach gives solutions
that are close to being optimal for different databases and Grid
configurations.
Abstract: Key management represents a major and the most
sensitive part of cryptographic systems. It includes key generation,
key distribution, key storage, and key deletion. It is also considered
the hardest part of cryptography. Designing secure cryptographic
algorithms is hard, and keeping the keys secret is much harder.
Cryptanalysts usually attack both symmetric and public key
cryptosystems through their key management. We introduce a
protocol to exchange cipher keys over insecure communication
channel. This protocol is based on public key cryptosystem,
especially elliptic curve cryptosystem. Meanwhile, it tests the cipher
keys and selects only the good keys and rejects the weak one.
Abstract: Safer driver behavior promoting is the main goal of this paper. It is a fact that drivers behavior is relatively safer when being monitored. Thus, in this paper, we propose a monitoring system to report specific driving event as well as the potentially aggressive events for estimation of the driving performance. Our driving monitoring system is composed of two parts. The first part is the in-vehicle embedded system which is composed of a GPS receiver, a two-axis accelerometer, radar sensor, OBD interface, and GPRS modem. The design considerations that led to this architecture is described in this paper. The second part is a web server where an adaptive hierarchical fuzzy system is proposed to classify the driving performance based on the data that is sent by the in-vehicle embedded system and the data that is provided by the geographical information system (GIS). Our system is robust, inexpensive and small enough to fit inside a vehicle without distracting the driver.
Abstract: An acyclic coloring of a graph G is a coloring of its
vertices such that:(i) no two neighbors in G are assigned the same
color and (ii) no bicolored cycle can exist in G. The acyclic chromatic
number of G is the least number of colors necessary to acyclically
color G. Recently it has been proved that any graph of maximum
degree 5 has an acyclic chromatic number at most 8. In this paper
we present another proof for this result.
Abstract: Stochastic models of biological networks are well established in systems biology, where the computational treatment of such models is often focused on the solution of the so-called chemical master equation via stochastic simulation algorithms. In contrast to this, the development of storage-efficient model representations that are directly suitable for computer implementation has received significantly less attention. Instead, a model is usually described in terms of a stochastic process or a "higher-level paradigm" with graphical representation such as e.g. a stochastic Petri net. A serious problem then arises due to the exponential growth of the model-s state space which is in fact a main reason for the popularity of stochastic simulation since simulation suffers less from the state space explosion than non-simulative numerical solution techniques. In this paper we present transition class models for the representation of biological network models, a compact mathematical formalism that circumvents state space explosion. Transition class models can also serve as an interface between different higher level modeling paradigms, stochastic processes and the implementation coded in a programming language. Besides, the compact model representation provides the opportunity to apply non-simulative solution techniques thereby preserving the possible use of stochastic simulation. Illustrative examples of transition class representations are given for an enzyme-catalyzed substrate conversion and a part of the bacteriophage λ lysis/lysogeny pathway.
Abstract: Emerging adulthood, between the ages of 18 and 25, as a new developmental stage extending from adolescence to young adulthood. According to Arnett [2004], there are experiments related to identity in three basic fields which are love, work and view of the world in emerging adulthood. When the literature related to identity is examined, it is seen that identity has been studied more with adolescent, and studies were concentrated on the relationship of identity with many demographic variables neglecting important variables such as marital status, parental status and SES. Thus, the main aim of this study is to determine whether identity statuses differenciate with marital status, parental status and SES. A total of 700 emerging adults participated in this study, and the mean age was 22,45 years [SD = 3.76]. The sample was made up of 347 female and 353 male. All participants in the study were students from colleges. Student responses to the Extended Version of the Objective Measure of Ego Identity Status [EOM-EIS-2] used to classify students into one of the four identity statuses. SPSS 15.00 program wasa used to analyse data. Percentage, frequency and X2 analysis were used in the analysis of data. When the findings of the study is viewed as a whole, the most frequently observed identity status in the group is found to be moratorium. Also, identity statuses differenciate with marital status, parental status and SES. Findings were discussed in the context of emerging adulthood.
Abstract: To increase reliability of face recognition system, the
system must be able to distinguish real face from a copy of face such
as a photograph. In this paper, we propose a fast and memory efficient
method of live face detection for embedded face recognition system,
based on the analysis of the movement of the eyes. We detect eyes in
sequential input images and calculate variation of each eye region to
determine whether the input face is a real face or not. Experimental
results show that the proposed approach is competitive and promising
for live face detection.
Abstract: This work proposes an optical fiber system (OF) for
sensing various volatile organic compounds (VOCs) in human breath
for the diagnosis of some metabolic disorders as a non-invasive
methodology. The analyzed VOCs are alkanes (i.e., ethane, pentane,
heptane, octane, and decane), and aromatic compounds (i.e., benzene,
toluene, and styrene). The OF displays high analytical performance
since it provides near real-time responses, rapid analysis, and low
instrumentation costs, as well as it exhibits useful linear range and
detection limits; the developed OF sensor is also comparable to a
reference methodology (gas chromatography-mass spectrometry) for
the eight tested VOCs.
Abstract: This paper presents an experimental case using sensory thermography to describe temperatures behavior on median nerve once an activity of repetitive motion was done. Thermography is a noninvasive technique without biological hazard and not harm at all times and has been applied in many experiments to seek for temperature patterns that help to understand diseases like cancer and cumulative trauma disorders (CTD’s). An infrared sensory thermography technology was developed to execute this study. Three women in good shape were selected for the repetitive motion tests for 4 days, two right-handed women and 1 left handed woman, two sensory thermographers were put on both median nerve wrists to get measures. The evaluation time was of 3 hours 30 minutes in a controlled temperature, 20 minutes of stabilization time at the beginning and end of the operation. Temperatures distributions are statistically evaluated and showed similar temperature patterns behavior.
Abstract: Road rage is an increasingly prevalent expression of
aggression in our society. Its dangers are apparent and understanding
its causes may shed light on preventative measures. This study
involved a fifteen-minute survey administered to 147 undergraduate
students at a North Eastern suburban university. The survey
consisted of a demographics section, questions regarding financial
investment in respondents- vehicles, experience driving, habits of
driving, experiences witnessing role models driving, and an
evaluation of road rage behavior using the Driving Vengeance
Questionnaire. The study found no significant differences in driving
aggression between respondents who were financially invested in
their vehicle compared to those who were not, or between
respondents who drove in heavy traffic hours compared to those who
did not, suggesting internal factors correlate with aggressive driving
habits. The study also found significant differences in driving
aggression between males versus females, those with more points on
their license versus fewer points, and those who witnessed parents
driving aggressively very often versus rarely or never. Additional
studies can investigate how witnessing parents driving aggressively
is related to future driving behaviors.
Abstract: In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
Abstract: We present in this paper an acquisition and treatment system designed for semi-analog Gamma-camera. It consists of a nuclear medical Image Acquisition, Treatment and Display chain(IATD) ensuring the acquisition, the treatment of the signals(resulting from the Gamma-camera detection head) and the scintigraphic image construction in real time. This chain is composed by an analog treatment board and a digital treatment board. We describe the designed systems and the digital treatment algorithms in which we have improved the performance and the flexibility. The digital treatment algorithms are implemented in a specific reprogrammable circuit FPGA (Field Programmable Gate Array).interface for semi-analog cameras of Sopha Medical Vision(SMVi) by taking as example SOPHY DS7. The developed system consists of an Image Acquisition, Treatment and Display (IATD) ensuring the acquisition and the treatment of the signals resulting from the DH. The developed chain is formed by a treatment analog board and a digital treatment board designed around a DSP [2]. In this paper we have presented the architecture of a new version of our chain IATD in which the integration of the treatment algorithms is executed on an FPGA (Field Programmable Gate Array)
Abstract: This paper introduces a technique for simulating a
single-server exponential queuing system. The technique called the
Q-Simulator is a computer program which can simulate the effect of
traffic intensity on all system average quantities given the arrival
and/or service rates. The Q-Simulator has three phases namely: the
formula based method, the uncontrolled simulation, and the
controlled simulation. The Q-Simulator generates graphs (crystal
solutions) for all results of the simulation or calculation and can be
used to estimate desirable average quantities such as waiting times,
queue lengths, etc.
Abstract: The Detour matrix (DD) of a graph has for its ( i , j)
entry the length of the longest path between vertices i and j. The
DD-eigenvalues of a connected graph G are the eigenvalues for its
detour matrix, and they form the DD-spectrum of G. The DD-energy
EDD of the graph G is the sum of the absolute values of its DDeigenvalues.
Two connected graphs are said to be DD- equienergetic
if they have equal DD-energies. In this paper, the DD- spectra of a
variety of graphs and their DD-energies are calculated.
Abstract: Nowadays, web-based technologies influence in
people-s daily life such as in education, business and others.
Therefore, many web developers are too eager to develop their web
applications with fully animation graphics and forgetting its
accessibility to its users. Their purpose is to make their web
applications look impressive. Thus, this paper would highlight on the
usability and accessibility of a voice recognition browser as a tool to
facilitate the visually impaired and blind learners in accessing virtual
learning environment. More specifically, the objectives of the study
are (i) to explore the challenges faced by the visually impaired
learners in accessing virtual learning environment (ii) to determine
the suitable guidelines for developing a voice recognition browser
that is accessible to the visually impaired. Furthermore, this study
was prepared based on an observation conducted with the Malaysian
visually impaired learners. Finally, the result of this study would
underline on the development of an accessible voice recognition
browser for the visually impaired.
Abstract: World has entered in 21st century. The technology of
computer graphics and digital cameras is prevalent. High resolution
display and printer are available. Therefore high resolution images
are needed in order to produce high quality display images and high
quality prints. However, since high resolution images are not usually
provided, there is a need to magnify the original images. One
common difficulty in the previous magnification techniques is that of
preserving details, i.e. edges and at the same time smoothing the data
for not introducing the spurious artefacts. A definitive solution to this
is still an open issue. In this paper an image magnification using
adaptive interpolation by pixel level data-dependent geometrical
shapes is proposed that tries to take into account information about
the edges (sharp luminance variations) and smoothness of the image.
It calculate threshold, classify interpolation region in the form of
geometrical shapes and then assign suitable values inside
interpolation region to the undefined pixels while preserving the
sharp luminance variations and smoothness at the same time.
The results of proposed technique has been compared qualitatively
and quantitatively with five other techniques. In which the qualitative
results show that the proposed method beats completely the Nearest
Neighbouring (NN), bilinear(BL) and bicubic(BC) interpolation. The
quantitative results are competitive and consistent with NN, BL, BC
and others.
Abstract: The shortest path question is in a graph theory model
question, and it is applied in many fields. The most short-path
question may divide into two kinds: Single sources most short-path,
all apexes to most short-path. This article mainly introduces the
problem of all apexes to most short-path, and gives a new parallel
algorithm of all apexes to most short-path according to the Dijkstra
algorithm. At last this paper realizes the parallel algorithms in the
technology of C # multithreading.
Abstract: The effect of different tempering temperatures and heat treatment times on the corrosion resistance of austenitic stainless steels in oxalic acid was studied in this work using conventional weight loss and electrochemical measurements. Typical 304 and 316 stainless steel samples were tempered at 150oC, 250oC and 350oC after being austenized at 1050oC for 10 minutes. These samples were then immersed in 1.0M oxalic acid and their weight losses were measured at every five days for 30 days. The results show that corrosion of both types of ASS samples increased with an increase in tempering temperature and time and this was due to the precipitation of chromium carbides at the grain boundaries of these metals. Electrochemical results also confirm that the 304 ASS is more susceptible to corrosion than 316 ASS in this medium. This is attributed to the molybdenum in the composition of the latter. The metallographic images of these samples showed non–uniform distribution of precipitated chromium carbides at the grain boundaries of these metals and unevenly distributed carbides and retained austenite phases which cause galvanic effects in the medium.
Abstract: During the last few decades in the academic field, the
debate has increased on the effects of social geography on the
opportunities of socioeconomic integration. On one hand, it has been
discussed how the contents of the urban structure and social
geography affect not only the way people interact, but also their
chances of social and economic integration. On the other hand, it has
also been discussed how the urban structure is also constrained and
transformed by the action of social actors. Without questioning the
powerful influence of structural factors, related to the logic of the
production system, labor markets, education and training, the
research has shown the role played by place of residence in shaping
individual outcomes such as unemployment. In the context of this
debate the importance of territory of residence with respect to the
problem of unemployment has been highlighted.
Although statistics of unemployment have already demonstrated
the unequal incidence of the phenomenon in social groups, the issue
of uneven territorial impact on the phenomenon at intra-urban level
remains relatively unknown.
The purpose of this article is to show and to interpret the spatial
patterns of unemployment in the city of Porto using GIS (Geographic
Information System - GIS) technology. Under this analysis the
overlap of the spatial patterns of unemployment with the spatial
distribution of social housing, allows the discussion of the
relationship that occurs between these patterns and the reasons that
might explain the relative immutability of socioeconomic problems in
some neighborhoods.